Showing headlines posted by trendoceangd
« Previous ( 1 ... 13 14 15 16 17 18 19 20 ... 21 ) Next »How to use SUID and SGID in Linux with examples
Regular permission can be overridden by special permissions like SUID, SGID, and sticky bit. When you use the special permissions on a file, then only the owner of the file or group owner can manipulate the file.
PC Gaming Using Linux As Your OS Here’s What You Need to Know
Traditionally, when people consider PC gaming, the overwhelming majority have only really considered Microsoft Windows as the operating system of choice. However, those thoughts are slowly changing, with Linux becoming more accepted.
How to automount disk or USB in Linux {GUI/CLI}
We have recently covered an article on the UUID of disk storage, where we discussed why we need UUID, how to retrieve it, and all. It is important to have a UUID when you want to automount your drive.
Install Zig Programming Language on Linux
Zig is an open-source, imperative, statically typed, compiled programming language designed by Andrew Kelley in 2016. Zig’s programming language has made some big claims by its designer that Zig utilizes C libraries better than C itself.
What is sticky bit permission, and how to use it
In this article, you will see what sticky bit is and how to set and remove sticky bits from directories and files.
What is utmp,wtmp,btmp, and how to read?
Whenever you do a login, logout, or attempt to log in, everything gets recorded on your system, and there is a specific command that you can use to find out who has logged into your Linux system. In this article, you will see a binary file that is responsible for maintaining records and how to read the binary file using the “utmpdump“ utility.
Install Nim Programming Language on Linux
What is Nim Programming Language?
Nim is an open-source, imperative, statically typed compiled programming language. Nim combines the concepts from mature programming languages such as Python, Ada, and Modula.
Why to use Nim?
Why to use Nim?
How to extract and disassemble vmlinuz file
Obviously, you might wonder, why extract VMLinuz? What is the use of it? Extraction of assembly code may be helpful when you want to debug where the problem occurred and how the specific function is executed. And in this article, you will see how to extract the vmlinuz file and disassemble (read) the vmlinuz file in Linux.
How to unpack initrd/initramfs to view content in Linux
There may be a couple of reasons why you need to extract initramfs or initrd images. As of now, I want to fix my computer, which was not allowing me to use my laptop with the following error: “Failed to start VirtualBox Linux kernel modul
Micro: Modern and Intuitive Terminal-Based Text Editor
Nano isn’t good as it should be, while vim seems quite complex for the beginner. There are many Text Editor for Linux users, and choosing the best one is quite debatable. Suppose you do not want to leave nano because other editors are too complex and require a learning curve. Then you didn’t try till now micro terminal-based text editor.
Learn about Virtual memory statistics using vmstat
We can use multiple tools to monitor system statistics, but if you are looking for virtual memory, use vmstat, which support numerous options and parameters.
How to Install and Use Telnet on Linux Systems
Telnet can perform a few things that can be very helpful for Linux network administrators, like testing the open port over the remote system for troubleshooting, which is not possible in SSH protocol.
Download Linux distributions from a terminal using the OSGET utility
The conventional method to download ISO is best when you have access to Graphical User Interface (GUI), but what to do when you just have a command-line interface?
How to install QPrompt as an alternative to Teleprompter
An outbreak of COVID-19 cases has changed the way of living life earlier, we used to go to our offices, colleges, schools, but now we shifted to a virtual environment. Now you attend your office meeting from the couch, children attending their school while taking a nap, and many untold stories of different domains. Qprompt is one of the teleprompter software available on all major platforms, including Android mobile, and most importantly, it is an open-source application.
How to upgrade Linux Kernel to 5.16 Release
With the latest release, many new generation Intel and AMD hardware support were added along with the CPU and GPU devices. AMD processor having uphand on this update by the benchmark test done by Phoronix. Except that the latest kernel is also available for ARM-based devices like Raspberry PI 4.
Date command usage in Linux
At first, the date command may seem like a simple utility to you, but once you try to execute the date command with different utilities, you will realize the real power.
A simple solution to the Private Key-Loss Conundrum
Statistically, over 10% of users forget or lose their passwords or private keys for encrypted data. This is not a big problem if there is a password or private key recovery option, but it becomes a disaster when there is no way to recover the lost or forgotten password or private key. According to cryptocurrency data firm Chainalysis, over three million bitcoins are considered lost due to forgotten passwords.
How to Reset Forgotten Root Password in Debian and Bedrock Linux
Once you add a general user into the sudo group, then there is no need to use a root account for the administrative tasks. But due to some odd reason, you are not able to access your primary account?
In that case, the root account can be a savior. But unfortunately, you are not getting the root password too. Now the only way is to reset the root password.
In that case, the root account can be a savior. But unfortunately, you are not getting the root password too. Now the only way is to reset the root password.
Complete guide on Inode number in Linux with an examples
I’m going to ask you a question. What do you see when you pass the ls -l command? A list of files with a bunch of details like permission, number of files, file owner, group owner, size, date & time along with a file name, and more number of data can be accessed using different parameters, but have you ever imagined where all data get stored, and what we call for this data type?
How to resolve “.venv/bin/activate” is not executable by this user
Resolve .venv/bin/activate” is not executable by this user
The actual command to activate virtual environment is “source venv/bin/activate” or ” . venv/bin/activate“, but a user may get confused in the case of a hidden directory.
I think it would be better if you see some of the example to clear your concept
I think it would be better if you see some of the example to clear your concept